Guard against trust management vulnerabilities in Wireless Sensor Network

  • Rashmi Ranjan Sahoo
  • Sudhabindu Ray
  • Souvik Sarkar
  • Sourav Kumar Bhoi
Research Article - Computer Engineering and Computer Science
  • 15 Downloads

Abstract

Trust management system in Wireless Sensor Network (WSN) is rudimentary to identify malicious, selfish and compromised nodes. Many proposed trust management systems provide security to WSN from various internal attacks. However, like other security systems, trust management schemes are also vulnerable to attacks. In this paper, we have proposed a lightweight trust management scheme based on penalty and reward policy. We have investigated three different types of attacks against the trust management scheme and provide a defense mechanism for those attacks. The proposed mechanism is based on dynamic time sliding window for calculating the trust value of the nodes and finding out the behavior of the nodes. Theory and simulation show that the proposed GATE method has a high detection rate of the malicious nodes and it demands fewer resources than some of the recently proposed trust management schemes.

Keywords

Trust management Vulnerabilities Attacks Trust regain Dynamic sliding window 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Wang, Y.; Attebury, G.; Ramamurthy, B.: A survey of security issues in wireless sensor networks. IEEE Commun. Surv. Tutor. 8(2), 2–23 (2006)CrossRefGoogle Scholar
  2. 2.
    Osman, K.; Samee, U.K.; Sajjad, A.M.; et al.: Comparative study of trust and reputation systems for wireless sensor networks. Secur. Commun. Netw. 6(6), 669–688 (2013)CrossRefGoogle Scholar
  3. 3.
    Lopez, J.; Roman, R.; Agudo, I.; Fernandez-Gago, C.: Trust management systems for wireless sensor networks: best practices. Comput. Commun. 33(9), 1086–1093 (2010)CrossRefGoogle Scholar
  4. 4.
    Lu, Y.; Lin, K.; Li, K.: Trust evaluation model against insider attack in wireless sensor networks. In: IEEE Second International Conference on Cloud and Green Computing (CGC), pp. 319–326 (2012)Google Scholar
  5. 5.
    Yan, S.; Zhu, H.; Ray, L.K.J.: Defense of trust management vulnerabilities in distributed networks. IEEE Commun. Mag. 46(4), 112–119 (2008)Google Scholar
  6. 6.
    Momani, M.; Challa, S.; Aboura, K.: Modeling trust in wireless sensor networks from the sensor reliability perspective. In: Innovative Algorithms and Techniques in Automation, Industrial Electronics and Telecommunications, pp. 317–321. Springer, Netherlands (2007)Google Scholar
  7. 7.
    Anita, X.; Bhagyaveni, M.A.; Martin Leo Manickam, J.: Collaborative lightweight trust management scheme for wireless sensor networks. Wirel. Pers. Commun. 80(1), 117–140 (2015)CrossRefGoogle Scholar
  8. 8.
    Chae, Y.; DiPippo, L.C.; Sun, Y.L.: Trust management for defending on-off attacks. IEEE Trans. Parallel Distrib. Syst. 26(4), 1178–1191 (2015)CrossRefGoogle Scholar
  9. 9.
    Chen, X.; Makki, K.; Yen, K.; Pissinou, N.: Sensor network security: a survey. IEEE Commun. Surv. Tutor. 11(2), 52–73 (2009)CrossRefGoogle Scholar
  10. 10.
    Ishmanov, F.; Kim, S.W.; Nam, S.Y.: A robust trust establishment scheme for wireless sensor networks. Sensors 15, 7040–7061 (2015)CrossRefGoogle Scholar
  11. 11.
    Li, X.; Zhou, F.; Du, J.: LDTS: a lightweight and dependable trust system for clustered wireless sensor networks. IEEE Trans. Inf. Forensic Secur. 8, 924–935 (2013)CrossRefGoogle Scholar
  12. 12.
    Shaikh, R.A.; Jameel, H.; dAuriol, B.J.; Lee, H.; Lee, S.Y.; Song, Y.J.: Group-based trust management scheme for clustered wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 20(11), 1698–1712 (2009)CrossRefGoogle Scholar
  13. 13.
    Ishmanov, F.; Kim, S.W.; Nam, S.Y.: A secure trust establishment scheme for wireless sensor networks. Sensors 14, 1877–1897 (2014)CrossRefGoogle Scholar
  14. 14.
    Chen, S.; Zhang, Y.; Liu, Q.; Feng, J.: Dealing with dishonest recommendation: the trail in reputation management court. Ad Hoc Netw. 10, 1603–1618 (2012)CrossRefGoogle Scholar
  15. 15.
    Qu, C.; Ju, L.; Jia, Z.; Xu, H.; Zheng, L.: Light-weight trust based on-demand multi path routing protocol for mobile ad hoc networks. In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-13), pp. 42–49 (2013)Google Scholar
  16. 16.
    Sahoo, R.R.; Singh, M.; Sardar, A.R.; Mohapatra, S.; Sarkar, S.K.: TREE-CR: Trust based secure and energy efficient clustering in WSN. In: Emerging Trends in Computing, Communication and Nano Technology (ICE-CCN), IEEE International Conference, Tirunelveli, pp. 532–538 (2013)Google Scholar
  17. 17.
    Momani, M.; Challa, S.: Survey of trust models in different network domains. Int. J. Ad Hoc Sensor Ubiquitous Comput. 1(3), 1–19 (2010)CrossRefGoogle Scholar
  18. 18.
    Momani, M.; Agbinya, J.; Navarrete,  G.P.; Akache, M.: A new algorithm of trust formation in wireless sensor networks. In: First IEEE International Conference on Wireless Broadband and Ultra Wide-band Communications; Sydney, Australia (2006)Google Scholar
  19. 19.
    Bao, F.; Chen, I.; Chang, M.; Cho, J.: Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Trans. Netw. Serv. Manag. 9(2), 169–183 (2012)CrossRefGoogle Scholar
  20. 20.
    Zahariadis, T.; Leligou, H.C.; Trakadas, P.; Voliotis, S.: Trust management in wireless sensor networks. Eur. Trans. Telecommun. 21, 386–395 (2010)Google Scholar
  21. 21.
    Sahoo, R.R.; Sardar, A.R.; Singh, M.; Ray, S.; Sarkar, S.K.: A bio inspired and trust based approach for clustering in WSN. Nat. Comput. 15(3), 423–434 (2016)MathSciNetCrossRefGoogle Scholar
  22. 22.
    Zhan, G.X.; Shi, W.S.; Deng, J.L.: Sensor Trust: a resilient trust model for wireless sensing systems. Pervasive Mob. Comput. 7(4), 509–522 (2011)CrossRefGoogle Scholar
  23. 23.
    Luo, W.; Ma, W.; Gao, Q.: A dynamic trust management system for wireless sensor networks. Secur. Commun. Netw. 9(7), 613–621 (2015)CrossRefGoogle Scholar
  24. 24.
    Crosby, G.V.; Pissinou, N.; Gadze, J.: A framework for trust-based cluster head election in wireless sensor networks. In: Proceedings of Second IEEE Workshop on Dependability and Security in Sensor Networks and Systems (2006)Google Scholar
  25. 25.
    Guowei, W.; Zhuang, D.; Yibo, H.; Jung, T.; Fiore, U.; Yim, K.: A dynamic trust model exploiting the time slice in WSNs. Soft. Comput. 18, 1829–1840 (2014)CrossRefGoogle Scholar
  26. 26.
    Huber, P.J.: Robust Statistics. Wiley, New York (1981)CrossRefMATHGoogle Scholar
  27. 27.
    Anita, X.; Martin, L.M.J.; Bhagyaveni, M.A.: Two-Way acknowledgment-based trust framework for wireless sensor networks. Int. J. Distrib. Sens. Netw. 9(5), 1–14 (2013)CrossRefGoogle Scholar

Copyright information

© King Fahd University of Petroleum & Minerals 2018

Authors and Affiliations

  • Rashmi Ranjan Sahoo
    • 1
  • Sudhabindu Ray
    • 2
  • Souvik Sarkar
    • 3
  • Sourav Kumar Bhoi
    • 1
  1. 1.Department of Computer Science and EngineeringParala Maharaja Engineering CollegeBerhampurIndia
  2. 2.Department of Electronics and Tele-Communication EngineeringJadavpur UniversityKolkataIndia
  3. 3.DelloitIndia

Personalised recommendations